Количество 5
Количество 5
CVE-2025-12888
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
CVE-2025-12888
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
CVE-2025-12888
Constant Time Issue with Xtensa-based ESP32 and X22519
CVE-2025-12888
Vulnerability in X25519 constant-time cryptographic implementations du ...
GHSA-xmgq-3783-qgm4
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-12888 Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-12888 Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-12888 Constant Time Issue with Xtensa-based ESP32 and X22519 | 0% Низкий | 2 месяца назад | ||
CVE-2025-12888 Vulnerability in X25519 constant-time cryptographic implementations du ... | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
GHSA-xmgq-3783-qgm4 Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу